[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fCu28Sp4K91B1WarSw2VELKt8eHTjgTOm_QQ8NlyfXXY":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2023-4274","migration-backup-staging-wpvivid-authenticated-administrator-arbitrary-directory-deletion-via-path-traversal","Migration, Backup, Staging – WPvivid \u003C= 0.9.89 - Authenticated (Administrator+) Arbitrary Directory Deletion via Path Traversal","The Migration, Backup, Staging – WPvivid plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 0.9.89. This allows authenticated attackers with administrative privileges to delete the contents of arbitrary directories on the server, which can be a critical issue in a shared environments.","wpvivid-backuprestore",null,">=0.9.89 \u003C=0.9.89","0.9.90","high",8.7,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:H\u002FUI:N\u002FS:C\u002FC:N\u002FI:H\u002FA:H","Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","2023-09-22 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F5d94f38f-4b52-4b0d-800c-a6fca40bda3c?source=api-prod",123]